Blog

  • Election Design

    Manifesto It’s no surprise the British electorate continues to be disinterested by political discourse. Today the BBC chose to make front-page news from a vacuous and banal discussion comparing the relative merits of the print design of the Labour and Conservative manifestos.
    The BBC’s Manifesto designs under the microscope reduces political discussion to pull quotes and the use of white space! Maybe a Ball & Swoosh could swing Parliament to the LibDems?
  • Little India

    ShivaSanjay Patel is a storyboard artist and animator for PIXAR animation…his Little India illustrations at ghee happy are wicked-cute, cartoon renderings of the gods of Hindu mythology – Ganesa, Brahma, Durga, Shiva, Hanuman, Matsya, Kali, Vishnu, Rama, Narasimha, Krishna, Pareshsuarama, Varaha & Lakshmi.

    If you’re Hindu, you’ll either find them blasphemously offensive or really cute…

  • MSN Messenger & IM Innovation

    In the last few days MSN has been gradually rolling out upgrades for its MSN Messenger service; though a public betas has been running for some time, the final release includes a number of features not available during the beta phase.

    Like recent releases of AIM and Yahoo! Messenger. much of the enhancement seems to be  juvenile and cosmetic (winks, nudges, emoticons), though there are a handful of interesting new social features:

    Personalmessage The Personal Message feature builds on the trend of users using their screenname to indicate some information about their status not covered by the standard Online/Away/Busy.

    The What I’m Listening To variant of the Personal Message displays the music a user is currently listening to – curiously, Microsoft has recognised the dominance of iTunes and draws information from both iTunes and its own Windows Media Player, though the message is hyperlinked to MSN Music.

    A user’s buddy-list icon is now enriched with thumbnail images, notification of new content information, their new photos at MSN Photos and any new posts at their MSN Spaces blog…in a lightweight stealthy imitation of richer RSS newsreaders.

    Sharedsearch_2Finally, building on the pioneering work of ActiveBuddy’s SmarterChild agent, the message window now allows users to initiate shared searches with their buddies, invoking search results in both user’s message windows and allowing a click through to richer results from MSN Search.

    Though on the surface, such enhancements appear useful and fun, IM innovation seems to have stalled within infantile trinkets and the subtle imprisonment of users within a group of services from a single provider – in this case MSN, but AOL and Yahoo have exhibited similar behavior. What Microsoft has subtlety done is reverse the rulings that led to the inclusion of the Set Program Access & Defaults in Windows XP SP1.

    This points to a larger question in the overall development of IM – where prior criticisms have been directed at the lack of interoperability, the current closed nature of development is, in my opinion, holding back useful innovations around instant messaging.

    No major IM network – AOL, MSN or Yahoo – offer the ability for third parties to develop interesting and innovative applications that extend the features prescribed by the major networks. Consequently, the progress of IM development is locked into inane features that do not, for example, build on the potential of rich presence management.

    What if I want …

    • The What I’m Listening To status to link to iTunes Music Store, or my friends Audioscrobbler trails.
    • The Shared Search to return Google results, rather than Microsoft.
    • New photo and blog notifications to come from my Flickr and Typepad accounts.
    • Features that let me intuitively and auto-magically manage my presence & status according to changing circumstances (being at home, work, on the move, blocking our coworkers etc.)

    Currently, there is no mechanism, technical or legal, to enable such remixing of the emerging IM experience…either due to protectionist measures by  network owners or a myopic view of innovation in an open-source culture.

    Telcos have long practiced closed models of innovation and seen their businesses hemorrhage into the hands of upstarts like Skype…whereas those who embrace open developers programmes – Flickr, Google, eBay, Amazon – have experienced innovations that extend their platform businesses and drive growth.

    When IM operators understand that they’re most valuable as platform businesses, we can expect to see real innovation as the developer community applies itself to solving real problems and fulfilling a multitude of user needs, rather than infantilised feature sets.

    UPDATE: AOL today announced that third parties will be able to attain partners status to develop solutions that run on top of AIM, ICQ, Netscape and iChat…albeit for enterprises – still, its a step in the right direction.

  • Inversion Of Privacy

    Last week, Bloglines took another step towards transforming the RSS newsreader into a universal inbox with the introduction of its Package Tracking feature – presenting users with the ability to track their UPS package deliveries through notification events from within Bloglines.

    By sheer coincidence, IEbags ‘d just ordered a Timbuk2 Detour messenger bag from eBags and was able to try the new feature, tracking my purchase through Umkirch, Frankfurt, Barking and Dewsbury. If you’d like to see this for yourself, simply visit my public profile and click the link for UPS Tracking Feed for M1561935154 in the left-hand pane. I’m sure Amazon will follow suit with an order tracking feature.

    Services such as Audioscrobbler, Flickr, Buttress and del.icio.us have demonstrated the versatility of RSS as a general purpose notification medium, not simply for text but photos, TV, torrents, URLs and now eCommerce…delivering on the promise of 3rd party notification services explored tentatively by IM operators such as MSN.

    However, Bloglines’ Package Tracking does underline some of the limitations of RSS. Essentially, designed as a syndication mechanism, RSS is being stretched into application areas that necessitate some form of digital identity and privacy capabilities…subscribing to the UPS feed did not require authentication, hence exposing a potentially private event into the public sphere…if my Hotmail account was leaving an RSS trail, it would be personally very useful in terms of integration with my newsreader, but disastrous for my privacy.

    Despite these limitations, which will be resolved in time, RSS has delivered on the vision for web services, offering lightweight interoperability between previously disconnected islands of data.

  • My Head Is Full

    ETech 2005 just drew to a close with Mark Fletcher’s garage guide to starting up web companies.

    In the course of the last week, the France Telecom team has posted close to 70 articles tracking developments throughout the course of the week – from individual tutorials to keynotes and sessions.

    Most of the content is currently is draft mode – over the course of the next few days, you’ll begin to see the articles trickle out with our account.

  • From the Garage: Lessons Learned Birthing and Building Web Start-Ups

    Mark Fletcher, founder of both Bloglines (just acquired by Ask Jeeves) and ONElist (now Yahoo Groups), presented a fascinating talk on what it takes to launch a startup in the online services market – notably how to design and build systems for reliability and scale and on budget. Fletcher’s talk was actually a useful compliment to Marc Hedlund’s earlier session on VC Funding for Geeks. Fletcher outlined a ‘garage philosophy’ for creating startups, consisting of a number of core principles:

    • Passion for the idea
    • Utilisation of cheap technologies
    • Simplicity
    • Releasing early & releasing often
    • Involving users – the best features come from user requests
    • Have fun, be passionate and enjoy the work
    • Moonlighting – limiting risks by continuing to work a ‘day job’
    • Obtain funding from friends & family before VCs
    • Begin with free services to lessen pressure
    • Offer a developer API to encourage innovation
    • Hire a lawyer, from this weblink online
    • Find good help – notably a sysadmin
    • Outsource tasks using freelance resources such as eLance

    Fletcher characterised registration-based websites as having two core infrastructures: front-end web servers and mail services (anything that talks directly to a user) and back-end systems for user data, other databases and storage. Software recommendations included:

    In terms of hardware choices, Fletcher recommends:

    • Dedicated servers rather than buying or hosting your own equipment
    • Design for cheap hardware
    • eBay!
    • APC power distribution units for remote power cycling
    • HP Procurve networking appliances
    • Avoid Seagate Ultra-SCSI drives
    • A good phone for SSH remote system administration

    To illustrate architectural choices, Fletcher actually cited some of the design decisions made in the development of Bloglines:

    • Bloglines RSS news feeds are actually copied to each of ten web servers rather than being served directly to each requesting client. Copying files can outperform client-server requests in many cases.
    • The number of subscribers to Bloglines is currently counted in one pass through all user records and saved, rather than calculated on the fly – improving performance, but shifting from real-time to periodic reporting, which is more than adequate for current needs.
    • The Bloglines desktop notifier experiences 1-200 hits per second, so data is held in memory rather than retrieved from disc.

    In deciding upon storage options, Fletcher contrasts relational databases with file-based storage and notably the use of RAID storage or redundant servers. ONElist utilised arrays of RAID drives to provide a storage infrastructure, where Bloglines utilises a software RAID-1 infrastructure based on Linux.

    In administering systems, Fletcher doesn’t give too much detail, but recommends:

    • Utilise DNS round-robin load balancing for for web servers
    • Employ hot backups for offline processing
    • Worry about cooling co-located data centers

    Finally, Fletcher urged entrepreneurs and innovators to avoid making stupid bets citing a bet to shave his head if ONElist was ever sold!

  • Making Web Services Personal

    Ben Trott, co-founder of Six Apart and its current CTO, led an all-too-brief session (20 minutes!!) on where blogging platforms are driving innovation in services and formats and the direction this may take in the future.

    Blogs are beginning to evolve from simple journals to automated aggregators or personal content – effectively inverting the role of tradtional Yahoo!/MSN style portals, by placing the blog owner as the brand.

    Trott described how the current generation of blogging services enable authors to combine data in interesting ways, aggregating data across multiple sites to form connections and articulate a rich personal identity…also hinting at mechanisms for creating location-based services. The bulk of the sesssion explored three service scenarios where blogs and open data formats are being orchestrated and wired together to create interesting new services.

    The Personal Friends Aggregator is best descibed as an equivalent to the LiveJournal Friends that lists recent posts from a network of friend’s blogs. This service utilises open data and is therefore not tied to a particular service. This services interrogates your own FOAF social network description data for each friend, automatically discovers their syndication feeds and formats new entries into an aggregated list of links.

    Trott’s Feed Splicer is similar to services offered by Feedburner‘s in that it takes, as inputs, all the syndication feeds that represent your online presence and splices them into a into a single feed.

    The final service, a Blog Metadata Database, utilises the blo.gs directory to ‘listen’ for new content from the blogosphere, fetch new each newly posted blog entry and extract metadata into a local database.

    While none of the services described by Trott are innovative or shifts in thinking, they do represent the increasing simplicity required in synchronising and orchestrating data from multiple services into a new application; delivering on the promise of web services, but with much lower barriers to entry.

    Many of the services and components described by Trott are available from Six Apart’s Professional Network Power Tools site here…

  • Tech That Helps the World

    Lee Felsenstein‘s session on what he terms fair trade technology and technology that helps the world had shamefully low attendance given the subject matter. Indeed this was unusual given the ordinarily optimistic and near-utopian vibe of ETech, however the poor attendance may be due in part to poor schduling at the close of the conference when many delegates are leaving the venue.

    Nevertheless, Felsenstein’s session was a great introduction to the altruistic work of the Fonly Institute and their work in the Third World. Felsenstein opened by profiling Phon Kom, a community in Laos that is unable to feed itself reliably, yet high social cohesion has enabled themselves to raise taxes, improve schooling, relocate from the Plain of Jars and improve employment prospects. However, Phon Kom’s rural economy s struggling against the forces of globalisation as free-trade agreements and markups by middlemen and retailers in the developed world are not passed to the villagers, who are becoming increasingly disconnected from their traditional culture, buffeted by crime and political instability.

    Phon Kom expatriates led a former US serviceman and the Jhai Foundation to understand what could help the villagers compete in a global market place.

    Felsenstein draws an interesting parallel between Free Trade and Fair Trade; where the former applys the rule of the strongest with no regard to non-economic consequences, agricultural issues, the latter takes human interactions into account, promoting a sustainable agricultural market where the farmer is a participant in the market economy, not simply accepting of given prices. This requires that farmers have access to market information.

    Felsenstein went on to articulate some principles for Fair Trade Technologies:

    • Migration by neccessity rather than opportunity is destabilising to society
    • Neccessary changes include:
      • Improvement of rural ncomes
      • Reduction of cultural isolation
      • Improvement of opportunities for the young
    • Telecoms are essential factor
    • Enabling technologies include embedded processors, open source software, VoIP and WiFi

    Felsenstein describes the increasing marginalisation of rural communities across the globe as an gradually destabilising factor for modern society. Historically, as human agriculture created food surplusses, cities became possible and indeed became cultural commons as rural communities become increasingly culturally marginalised despite feeding urban centres. As culture begins migrating to electronic media, rural people can potentially find some equity.

    In the village of El Limon, within the Dominican Republic, there are 20-100 homes suffering endemic poverty, with no telecommunications and very limited electricity and road networks. However, the village has line-of-sight to a small town with a population of 100’000 equipped with DSL access. In 1998, Fonly constructed a wireless link between the town and El Limon.

    Like Phon Kom, the residents of El Limon have high social cohesion and taking responsibility for their own future, are collaborating to effect social change, notably by articulating their requirements for telecommunication:

    • Education
    • Friends – all over the spanish speaking world! give them equal foorting and language skills acquired through chat
    • Family
    • Healthcare
    • Economic development

    Felsenstein described this cohesion and the fulfillment of these needs as cultural justice and also that the most important lessons learned in equipping rural communities are to build on existing technologies and social structures and listening to the needs of the community.

    In the region around El Limon, Fonly has helped build out an infrastructure using lower power PCs, generic wifi and inter-village VoIP and PSTN services for El Limon, Los Martinez, Los Ranchos and Las Caobas – serving a population of around 1000 rural residents.

    Though successful, the infrastructure does require a technical and financial support base, self-configuring networks, a prepay phone system (perhaps based on Asterisk) and of course more computers. More generally, Felsenstein’s loose system requirements for rural services to date are:

    • Village-based systems, capable of operation & maintenance by children (they are usually the only ones with time)
    • Telcos – local & internet-capable
    • 10 year longevity
    • Localised software
    • Web browsing, word processing, spreadsheets & printing

    The Jhai Foundation’s reference plaform, as used in Phon Kom, consists of 802.11b networks that link villages, data and VoIP services to the internet and links to the PSTN with OpenH323, POTS calls and PABX functionality.

    Felsenstein sees expatatriate disporas as crucial to distribution as they can aggregate the cost of the village system, they know the culture, the village and the players, they are willing to maintain contact and can provide commercial opportunities.

    The prospects for Fonly and Felsenstein’s work are promising, with a potential market of 100s of millions, if not billions, of customers – if costs can be kept low. There is an industry in formation around rural telecommunication, based on open source software and commodity hardware that could provide many global benefits, including direct economic benefits to participants on all sides.

    For Wanadoo’s TR team, it may represent an opportunity to apply the research from Project Mosaic, a low cost domestic computing+communication appliance, to a economically and socially just cause.

    You can download the full text of Felsenstein’s speech here…

    unique of:
    Amber Rose:
    A wonderful balance of soy products in food and wear alone but a fresh aroma of questions on the time I mean I decided not on the heat of woody notes with a local company called Tostada and hormonal issues like I decided not a glass of woody notes with a comfortable 90° F the World Health Benefits of eating soy candles and a lot of patchouli for men! Our rose family! A scent to wear alone but a plant-based source
    Mixed-Oily Soy Can Help You Prevent Heart Disease
    Soy Fragrance and lavender and includes several beneficial nutrients for your room of questions on the lights came up and over the effects of having the effects of these cool ideas that people were saying they were doing to tell everyone that Soy scented candles and over and about all these cool ideas that people were doing to the inside The best of smoke drifted over the weather
    The perfect fragrance alcohol beeswax phenoxyethanol fragrance and some contain much less energy per calorie than most of

  • Rendezvous

    Itunes ETech is a perrennial nexus of Powerbooks and iBooks – firing up iTunes and seeing how many users have enabled the Share My Music option much music is being shared over the local wifi network is always a novelty.

    In this screenshot you can see the music collections of the EFF’s Cory Doctorow and the BBC’s Matt Webb.

  • Trust Me: Adventures in Social Engineering

    Jon Oliver, MailFrontier‘s Director Of Research, describes social engineering as the means by which identity thieves extract passwords and account data from unwitting users. Oliver’s session outlines how criminals are using progressively more sophisticated techniques as users awareness increases.

    • 51m adults were ‘phished in 2004’; a 1126% increase from 2003.
    • In a survey, around 30% of users incorrectly identified a genuine or ‘phish’ email message.
    • Only 9% of users identified all ten messages correctly.
    • 5% of phished users, will click on an enclosed link.
    • Interestingly, demographic analysis shows that the supposedly Internet-savvy 18-25 age group is most gullible.

    In many cases, ‘harvesting’ sites are unwittingly hosted on computers where the owner is unaware of illicit activity. Oliver cited the cases of an eBay phishing site hosted on the PCs in a South Korean Internet cafe; the cafe owner was horrified to discover that a counterfeit eBay site was being served from his PCs. Interestingly, personalised phishing is a new trend – where a user experiences a definite uptick in phishing attempts following the sale of an item on eBay.

    Phishing attacks tend to follow an established pattern of presentation:

    • Build credibility by spoofing a real company with authentic sender addresses, and links to the company’s official site.
    • Create a reason to act through a plausible and urgent premise, requiring a quick response from the user.
    • Have a call to action combining an authentic visual URL with a hidden URL for the phishing site. For example, messages come from ‘www3.fashion.sony.com’ rather than ‘user@sony.com’.

    Phishers can openly purchase mailing lists list on eBay, as well as packages of template messages from leading sites. All that remains is to develop an attack email and the ‘fake’ website and locate servers from which to send the phishing messages.

    In examining the motivations of phishers, Oliver illustrated the high return on investment for phishers:

    • 2m emails are sent
    • Assume only 5% of messages (100’000 people) will be successfully delivered; phishing messages are more likely than spam to get through filtering algorithms
    • Assume only 5% (5’000 people) of recipients click through
    • Assume only 2% (100 people) of users who click through enter sensitive data
    • The FBI estimates that, those that reach this stage of a phishing attack, lose an average of $1200
    • Hence, the phishers can potentially earn $120’000 within a very short period of time. A good return on their investment.

    Interestingly, Oliver describes corporate phishing attacks as a recent growth area, whereby a corporate infrastructure comes under attack through Differential Harvest Attacks (DHAs) that seek to identify new employees through messages describing ‘essential security upgrades’ and ‘registration reminders’. The outsourced services of corporates (accounting, finances, CRM, remote meeting, credit cards, IT systems, DNS records) are invariably vulnerable points of attack. even a simple message to HR@company.com! Indeed the harm is far greater than individual phishing attacks.

    There are a number of methods for identifying phishing attacks, though there is no silver bullet or ‘catch-all’ method:

    • Identifying the sending server
    • Identifying links to the fake web server
    • Identifying that the email does not originate from who it purports to come from (authentication)
    • Identifying suspicious content; through statistical analysis of text
    • Identifying attempts to exploit browser security

    One audience member suggested that ‘white-hat’ phishing attacks could help to identify weaknesses and sensitise users to exert greater care. Another suggested that the falling trust in email would lead to more communication through an RSS-like medium.

    Oliver concluded that phishing and other email security threats are real, malicious and eroding trust in the use of email as a communications medium. Solutions must use multiple techniques to be effective, but in essence the best solutions require widespread change in user behavior – such as the use of PGP and S/MIME.